- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- IoT and Edge/Fog Computing
- Wireless Networks and Protocols
- Network Security and Intrusion Detection
- 3D Surveying and Cultural Heritage
- Software-Defined Networks and 5G
- Outsourcing and Supply Chain Management
- Internet Traffic Analysis and Secure E-voting
- Caching and Content Delivery
- Wireless Sensor Networks and IoT
- Technology and Security Systems
- Energy Harvesting in Wireless Networks
- Digital Transformation in Industry
- Simulation Techniques and Applications
- Conservation Techniques and Studies
- Cloud Computing and Resource Management
- Remote Sensing and LiDAR Applications
- Context-Aware Activity Recognition Systems
- Smart Grid Security and Resilience
- Blockchain Technology Applications and Security
- Peer-to-Peer Network Technologies
- Opportunistic and Delay-Tolerant Networks
- Anomaly Detection Techniques and Applications
- Security in Wireless Sensor Networks
Linköping University
2017-2024
Worcester Polytechnic Institute
2019-2023
Jiangxi University of Finance and Economics
2023
Central South University
2023
Guangdong Academy of Sciences
2023
Northeastern University
2023
Ericsson (Sweden)
2023
Beihang University
2023
ShanghaiTech University
2022
University of Manitoba
2022
The dramatic progresses of wireless technologies and wearable devices have significantly promoted the development popularity smart home, while digital twin (DT) emerges as a game changer benefiting from its enhanced capabilities visualization interaction. DT is able to build realtime continuous visual replica physical object or process, provide monitoring, anomaly prediction, interaction, lifecycle management. This paper presents model empower healthcare monitoring in home with goals...
In wireless ad hoc networks, although defense strategies such as intrusion detection systems (IDSs) can be deployed at each mobile node, significant constraints are imposed in terms of the energy expenditure systems. this paper, we propose a game theoretic framework to analyze interactions between pairs attacking/defending nodes using Bayesian formulation. We study achievable Nash equilibrium for attacker/defender both static and dynamic scenarios. The is more realistic model, since it...
Indoor climate is closely related to human health, comfort and productivity. Vertical plant wall systems, embedded with sensors actuators, have become a promising application for indoor control. In this study, we explore the possibility of applying machine learning based anomaly detection methods vertical systems so as enhance automation improve intelligence realize predictive maintenance climate. Two categories anomalies, namely point anomalies contextual are researched. Prediction-based...
Unmanned aerial vehicle (UAV) low-altitude remote sensing technology has recently been adopted in China. However, mapping accuracy and production processes of true digital orthophoto maps (TDOMs) generated by UAV images require further improvement. In this study, ground control points were distributed collected using a multi-rotor professional camera, at flight height 160 m above the designed sample distance (GSD) 0.016 m. A structure from motion (SfM), revised surface model (DSM) multi-view...
Despite the great success of two-stage detectors, single-stage detector is still a more elegant and efficient way, yet suffers from two well-known disharmonies during training, i.e. huge difference in quantity between positive negative examples as well easy hard examples. In this work, we first point out that essential effect can be summarized term gradient. Further, propose novel gradient harmonizing mechanism (GHM) to hedging for disharmonies. The philosophy behind GHM easily embedded into...
Historic buildings require good maintenance to sustain their function and preserve embodied heritage values. Previous studies have demonstrated the benefits of digitalization techniques in improving managing threats historic buildings. However, there still lacks a solution that can consistently organize data collected from reveal operating conditions real-time facilitate various analytics simulations. This study aims provide such help achieve preventive conservation. The proposed integrates...
An indoor climate is closely related to human health, well-being, and comfort. Thus, monitoring management are prevalent in many places, from public offices residential houses. Our previous research has shown that an active plant wall system can effectively reduce the concentrations of particulate matter volatile organic compounds stabilize carbon dioxide concentration environment. However, regular care restricted by geography be costly terms time money, which poses a significant challenge...
Internet of Things (IoT) has been found pervasive use cases and become a driving force to constitute digital society. The ultimate goal IoT is data the intelligence generated from data. With progress in public cloud computing technologies, more can be stored, processed analyzed release power IoT. However, due heterogeneity hardware communication protocols world, interoperability compatibility among different link layer protocols, sub-systems, back-end services have significant challenge...
Today, the edge-cloud computing paradigm starts to gain increasing popularity, aiming enable short latency, fast decision-making and intelligence at network edge, especially for industrial applications. The container-based virtualization technology has been put on roadmap by industry implement infrastructures. Has performance of stacks reached requirement? In this paper, from client perspective, we provide a evaluation methodology apply it state-of-the-art containerization-based influences...
In wireless ad hoc networks, although defence strategies such as Intrusion Detection Systems (IDSs) can be deployed at individual nodes, significant constraints are imposed in terms of the energy expenditure systems. this paper, we use a game theoretic framework to analyse interactions between pairs attacking/defending both static and dynamic contexts, considering complete incomplete information regarding maliciousness neighbouring nodes. The case analysis provides defender with an overview...
This study proposes a digitalization framework for historic buildings. In this framework, advanced techniques, like Internet of Things (IoT), cloud computing, and artificial intelligence (AI), are utilized to create digital twins A twin is software representation physical object. uses protect, predict, optimize through analytics real-time historical data selected features. Heterogeneous buildings, such as indoor environment, energy consumption metering, outdoor climate, collected with proper...
It is evident that traditional end-to-end intrusion detection mechanisms developed on wireless local area networks (WLANs) and wired are no longer sufficient for breach investigation in ad hoc networks. Most existing techniques proposed the network layer. In general, these have difficulty to localize attack source, can not respond attacks promptly. this paper, we investigate use of MAC layer traffic data characterize normal behaviors neighborhood a mobile node, detect misbehaving nodes...
Proximity service (ProSe), using the geographic location and device information by considering proximity of mobile devices, enriches services we use to interact with people things around us. ProSe has been used in social networks also smart home building automation (Google Home). To enable home, reliable stable network protocols communication infrastructures are needed. Thread is a new wireless protocol aiming at (BA), which supports mesh native Internet connectivity. The latency should be...
Building Information Modeling (BIM) has catalyzed transformative shifts across various industries, which sparked broader research interests in the BIM lifecycle. However, studies that specify stated requirements for different technologies and methodologies from perspective of lifecycle analyze hotspots future trends at each stage are scarce. Employing scientometric theories methods, this study conducts an in-depth comparative analysis stages. The encompasses several aspects like annual...
Motivated by the proliferation of wireless building automation systems (BAS) and increasing security-awareness among BAS operators, in this paper, we propose a taxonomy for security assessment BASs. We apply proposed to Thread, an emerging native IP-based protocol BAS. Our analysis reveals number potential weaknesses design Thread. solutions mitigating several identified discuss their efficacy. also provide suggestions improvements future versions standard. Overall, our shows that Thread has...
In this paper, we propose a node-based intrusion detection system (IDS) for wireless ad hoc networks. Specifically, define feature set that correlates information from MAC layer and network to profile normal behaviors of mobile nodes, also adapt rule-based data mining technique anomaly detection. The proposed IDS is able effectively detect an attack localize the source within one-hop perimeter. False positive rate reduced through decision module where intelligence gathered neighbor nodes...
Container orchestration platform is the foundation of modern cloud infrastructure. In recent years, container has been evolving to cross boundary device, edge, and cloud. More more IoT applications such as robotics XR have deployed across device-cloud continuum through platform, e.g., Kubernetes (K8s) framework. Meanwhile, rapid expansion advanced communication technologies like 5G endorsed revolution in network resource available for critical use cases. This paper aims integrate...
The need for energy efficiency in wireless communication is prevalent all areas, but to an even greater extent low-power and lossy networks that rely on resource-constrained devices. This paper seeks address the problem of modeling battery lifetime a duty-cycled node, participating sensor network typically used smart home building applications. Modeling MATLAB experimentation with prototype testing are employed predict validate lifetime. Various scenarios including sleepy end devices modeled...
This paper studies the dilemma between fault tolerance and energy efficiency in frame-based real-time systems. Given a set of K tasks to be executed on system that supports L voltage levels, proposed heuristic-based scheduling technique minimizes consumption execution when faults are absent, preserves feasibility under worst case occurrences. The first finds out optimal solution comparable continuous scaling, then converts original system. runtime complexity is only (LK <sup...